SlideShare uma empresa Scribd logo
1 de 40
Modbury & Salisbury

Top tips for protecting your
business online
Allison Miller, Vanguard Visions Consulting
You’ll find these slides at:
slideshare.net/vanguardvisions
Session Overview
• Why protect your business online?
• Why is now a good time to be doing business
online?
• Top tips for protecting your business online
• Online cyber-smart business assessment
• What will you investigate?
• Workshop evaluation
Why protect your
business online?
Why protect your
business online?
• More business is being done in
‘the Cloud’
• Privacy obligations
• Maintain reputation / trust
• Protect virtual assets (data)
• Multiple users of the one device

Image: IC3 and Computer Use and Safety - http://en.wikiversity.org/wiki/IC3/Computer_Use_and_Safety
What is the “Cloud”?
Cloud Computing aka “the Cloud”

Image: http://en.wikipedia.org/wiki/Cloud_computing
Types of Cloud Services

Image: 'What Type of Cloud?: Private, Public or+Hybrid?' - http://www.flickr.com/photos/26072489@N08/5332731617
Some Examples of Public Cloud Services
Some Examples of Private Cloud Services
A few ways of using the Cloud
1. Software as a Service (SAAS)
–
–
–
–

Email and Word processing
Accounting system
Human Resource/Project Management
Customer Service Management (CRM)

2. Platform as a service (PaaS)
– Operating Systems
– Web services
– Development Platforms

3. Infrastructure as a service (IaaS)
– Data storage
– Processing power
– Server virtualisation

Source: http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031
Why use the Cloud?
Pros:
•
•
•
•
•
•
•
•
•

Anytime, anywhere, any device
Quickly ‘scale up’
Stronger security
External (backup) storage services
Reduced license costs
Outsource ICT services
Collaboration
Synchronisation
Greener computing

Image: „Open Sky‟ by Vanguard Visions Consulting - http://www.flickr.com/photos/77018488@N03/8496879398
Why is now a good time
to do business online?
Top five industries to fly in 2013-14 in
Australia

Source: Ibis World (July 2013) –
http://www.ibisworld.com.au/media/2013/07/10/52/
Internet is a game changer

Source: Deloitte Access Economics Pty Ltd (2013) –
http://www.deloitte.com/view/en_AU/au/services/financial-advisory/deloitte-accesseconomics/05660fd56ab1e310VgnVCM1000003256f70aRCRD.htm
But what are some of the
risks on doing more
business online?
Possible threats to your business

General
Threats

• Hardware and software failure
• Malware
• Viruses
• Spam, scams and phishing
• Human error

Criminal
Threats

• Hackers
• Fraud
• Password theft
• Denial of service
• Security breaches
• Staff dishonesty

Natural
disasters

• Fire
• Floods

Tips from Queensland Government‟s Business and Industry Portal http://www.business.qld.gov.au/business/starting/business-startup-options/business-online-basics/online-security-fraud
Australian Department of Defence, Intelligence and Security, Oct 2013
Source: Strategies to Mitigate Targeted Cyber Intrusions - http://www.asd.gov.au/infosec/top35mitigationstrategies.htm
Top tips for protecting
your business online
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Image: Hard Disk Drive - http://en.wikipedia.org/wiki/Hard_disk_drive ; Iomega external hard disk drive - http://commons.wikimedia.org/wiki/File:Iomega_external_hard_disk_drive_%28cut%29.JPG
Develop a back-up strategy

1. Assess your level of risk and
identify actions to minimise
2. What data needs to be backed
up and how often
3. Select an appropriate back-up
device/location
4. Set reminds to do your back-ups
5. Test that you can use your
backed up data
6. Store backed up data away from
its original source

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Image: Master lock with root password - http://commons.wikimedia.org/wiki/File:Master_lock_with_root_password.jpg
Importance of Passwords

Password length
6
7
8
9
10
11
12
20

Time taken
2 seconds
3 minutes
5.5 hours
3 weeks
5.4 years
515 years
48 millennia
324 billion billion years

Source: Stay Smart Online Alert Service 23 Oct 2013 - http://www.staysmartonline.gov.au/alert_service/alerts/how_strong_is_your_password_sso_alert_priority_low
Creating strong passwords

Your password

Strengthening your password

Snow-storm
0214-Favourite
Red-leather-yellowleather
Allison-Miller

5n0w-5t0rm
0214-Fav0ur1te

Red-le8ther-Yellow-le8ther
8ll1son-M1ller

Source: Stay Smart Online Alert Service 23 Oct 2013 - http://www.staysmartonline.gov.au/alert_service/alerts/how_strong_is_your_password_sso_alert_priority_low
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Image: purple Slog: “Information Security Wordle” http://www.flickr.com/photos/purpleslog/2870445268/
Computer/Internet Security Policy

1. Acceptable use
2. Handling sensitive data
3. Securing and handling
equipment
4. Using internet safely
5. Remote access
6. Web browser setting

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Image: Tactical Technology Collective “Title Screen” - http://www.flickr.com/photos/ttc_press/5007644722/
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Image: Frederick Hermann - Just like the Nest with a more connected world all the devices need software updates now. Your TV, DVD player, watch, thermostat etc didn't used to ask for constant
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Image: Virtual Private Network - http://en.wikipedia.org/wiki/Virtual_private_network
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Imagine: e-commerce - http://commons.wikimedia.org/wiki/File:E-commerce.jpg
Create a secure online presence

1. Secure socket layer (SSL)
technology
2. Encrypted financial transaction
data
3. Update to latest (tested) version
4. Routine back-ups

Tips from Queensland Government‟s Business and Industry Portal http://www.business.qld.gov.au/business/starting/business-startup-options/business-online-basics/online-security-fraud
staysmartonline.gov.au/alert_service
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Do the cyber-smart
business assessment
staysmartonline.gov.au/business/home_based_businesses/questionnaire
Key points to remember

1. Have good network security
2. Protect your computer and
information
3. Protect and use mobile devices
safely
4. Transact securely online
5. Back up and protect data.

Tips from Queensland Government‟s Business and Industry Portal http://www.business.qld.gov.au/business/starting/business-startup-options/business-online-basics/online-security-fraud
What will you investigate
further?
Workshop evaluation
Want to know more?

More info: digitalcapability.com.au
Register for eUpdates: bit.ly/digitalcapability
Follow on:
Twitter - twitter.com/digitalcapabili
Facebook - facebook.com/digitalcapability
LinkedIn - bit.ly/DCLinkedIN
Google+ - bit.ly/DCGoogleplus
Pinterest - pinterest.com/vanguardvisions
Allison Miller
0400 732 270
allison@vanguardvisions.com.au
vanguardvisionsconsulting.com.au

vanguardvisionsconsulting.com.au

Mais conteúdo relacionado

Mais procurados

Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-SocialNetIQ
 
Enterprise-Class PHP Security
Enterprise-Class PHP SecurityEnterprise-Class PHP Security
Enterprise-Class PHP SecurityZendCon
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being HumanClearswift
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
Zoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyZoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyAdri Jovin
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Caston Thomas
 

Mais procurados (9)

Under thehood
Under thehoodUnder thehood
Under thehood
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
 
Enterprise-Class PHP Security
Enterprise-Class PHP SecurityEnterprise-Class PHP Security
Enterprise-Class PHP Security
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
Zoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyZoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case study
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 

Destaque

Destaque (6)

Power point obras arte ebru manolo
Power point obras arte ebru  manoloPower point obras arte ebru  manolo
Power point obras arte ebru manolo
 
Doo luis castellanos
Doo   luis castellanosDoo   luis castellanos
Doo luis castellanos
 
Orientacion a objetos cristina cachero
Orientacion a objetos   cristina cacheroOrientacion a objetos   cristina cachero
Orientacion a objetos cristina cachero
 
Adoo martha hidalgo
Adoo   martha hidalgoAdoo   martha hidalgo
Adoo martha hidalgo
 
Orientacion a objetos
Orientacion a objetosOrientacion a objetos
Orientacion a objetos
 
Aoo luis castellanos
Aoo   luis castellanosAoo   luis castellanos
Aoo luis castellanos
 

Semelhante a Top tips for protecting your business online (updated) Feb 14

Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13Vanguard Visions
 
Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614Vanguard Visions
 
Driving customers to your website
Driving customers to your websiteDriving customers to your website
Driving customers to your websiteVanguard Visions
 
Enterprise io t investment presentation
Enterprise io t investment presentationEnterprise io t investment presentation
Enterprise io t investment presentationRick Zullo
 
Head in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources ConferenceHead in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources ConferenceDavid Terrar
 
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...Vanguard Visions
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Cloud Security Alliance Lviv Chapter
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsMaganathin Veeraragaloo
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealthInvest
 
CNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical SecurityCNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical SecurityAdlan Hussain
 
Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016Adrian Cockcroft
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman
 

Semelhante a Top tips for protecting your business online (updated) Feb 14 (20)

Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13
 
Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614
 
Driving customers to your website
Driving customers to your websiteDriving customers to your website
Driving customers to your website
 
Enterprise io t investment presentation
Enterprise io t investment presentationEnterprise io t investment presentation
Enterprise io t investment presentation
 
Head in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources ConferenceHead in the Clouds - intro to cloud - CHC Resources Conference
Head in the Clouds - intro to cloud - CHC Resources Conference
 
Cloud security
Cloud security Cloud security
Cloud security
 
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threats
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
CNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical SecurityCNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical Security
 
Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016Microservices Workshop All Topics Deck 2016
Microservices Workshop All Topics Deck 2016
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 

Mais de Vanguard Visions

Social proof yourself in less than an hour a week
Social proof yourself in less than an hour a week Social proof yourself in less than an hour a week
Social proof yourself in less than an hour a week Vanguard Visions
 
What can I do with my eportfolio after formal education and training?
What can I do with my eportfolio after formal education and training?What can I do with my eportfolio after formal education and training?
What can I do with my eportfolio after formal education and training?Vanguard Visions
 
Choosing the right learning management system (LMS) / virtual learning enviro...
Choosing the right learning management system (LMS) / virtual learning enviro...Choosing the right learning management system (LMS) / virtual learning enviro...
Choosing the right learning management system (LMS) / virtual learning enviro...Vanguard Visions
 
Tips and tools for working smarter
Tips and tools for working smarterTips and tools for working smarter
Tips and tools for working smarterVanguard Visions
 
Increase student motivation (and reduce cheating) using Moodle and Mahara
 Increase student motivation (and reduce cheating) using Moodle and Mahara  Increase student motivation (and reduce cheating) using Moodle and Mahara
Increase student motivation (and reduce cheating) using Moodle and Mahara Vanguard Visions
 
Increase student motivation (and reduce cheating) using Mahara
Increase student motivation (and reduce cheating) using MaharaIncrease student motivation (and reduce cheating) using Mahara
Increase student motivation (and reduce cheating) using MaharaVanguard Visions
 
Top tips and techniques for getting started (or expanding) your flexible trai...
Top tips and techniques for getting started (or expanding) your flexible trai...Top tips and techniques for getting started (or expanding) your flexible trai...
Top tips and techniques for getting started (or expanding) your flexible trai...Vanguard Visions
 
Managing and measuring your social media activities using Hootsuite - October...
Managing and measuring your social media activities using Hootsuite - October...Managing and measuring your social media activities using Hootsuite - October...
Managing and measuring your social media activities using Hootsuite - October...Vanguard Visions
 
Evidencing compliance of quality training and assessment (SNR 15) through e-l...
Evidencing compliance of quality training and assessment (SNR 15) through e-l...Evidencing compliance of quality training and assessment (SNR 15) through e-l...
Evidencing compliance of quality training and assessment (SNR 15) through e-l...Vanguard Visions
 
Blogging brings you business - but how? - August 2014
Blogging brings you business - but how? - August 2014Blogging brings you business - but how? - August 2014
Blogging brings you business - but how? - August 2014Vanguard Visions
 
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10 Emerging E-learning Trends, Tools, Techniques supporting 70 20 10
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10 Vanguard Visions
 
Don't let your business become digital road kill - 250614
Don't let your business become digital road kill - 250614Don't let your business become digital road kill - 250614
Don't let your business become digital road kill - 250614Vanguard Visions
 
Creating and managing a WordPress business website - March 2014
Creating and managing a WordPress business website - March 2014Creating and managing a WordPress business website - March 2014
Creating and managing a WordPress business website - March 2014Vanguard Visions
 
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214Vanguard Visions
 
Implementing workplace online training - 130214
Implementing workplace online training - 130214Implementing workplace online training - 130214
Implementing workplace online training - 130214Vanguard Visions
 
E-portfolios: It’s more than filing stuff in a shoebox - 040214
E-portfolios: It’s more than filing stuff in a shoebox - 040214E-portfolios: It’s more than filing stuff in a shoebox - 040214
E-portfolios: It’s more than filing stuff in a shoebox - 040214Vanguard Visions
 
Managing Cloud Business Solutions Worksheets v2 Nov 13
Managing Cloud Business Solutions Worksheets v2 Nov 13Managing Cloud Business Solutions Worksheets v2 Nov 13
Managing Cloud Business Solutions Worksheets v2 Nov 13Vanguard Visions
 
How can iWOT support thin training markets - Converge13 - 211113
How can iWOT support thin training markets - Converge13 - 211113How can iWOT support thin training markets - Converge13 - 211113
How can iWOT support thin training markets - Converge13 - 211113Vanguard Visions
 
Vvc leading & managing people from anywhere - national telework week - 191113
Vvc   leading & managing people from anywhere - national telework week - 191113Vvc   leading & managing people from anywhere - national telework week - 191113
Vvc leading & managing people from anywhere - national telework week - 191113Vanguard Visions
 
Creating Learning-Centred Environments - IDEA13 - 121113
Creating Learning-Centred Environments - IDEA13 - 121113Creating Learning-Centred Environments - IDEA13 - 121113
Creating Learning-Centred Environments - IDEA13 - 121113Vanguard Visions
 

Mais de Vanguard Visions (20)

Social proof yourself in less than an hour a week
Social proof yourself in less than an hour a week Social proof yourself in less than an hour a week
Social proof yourself in less than an hour a week
 
What can I do with my eportfolio after formal education and training?
What can I do with my eportfolio after formal education and training?What can I do with my eportfolio after formal education and training?
What can I do with my eportfolio after formal education and training?
 
Choosing the right learning management system (LMS) / virtual learning enviro...
Choosing the right learning management system (LMS) / virtual learning enviro...Choosing the right learning management system (LMS) / virtual learning enviro...
Choosing the right learning management system (LMS) / virtual learning enviro...
 
Tips and tools for working smarter
Tips and tools for working smarterTips and tools for working smarter
Tips and tools for working smarter
 
Increase student motivation (and reduce cheating) using Moodle and Mahara
 Increase student motivation (and reduce cheating) using Moodle and Mahara  Increase student motivation (and reduce cheating) using Moodle and Mahara
Increase student motivation (and reduce cheating) using Moodle and Mahara
 
Increase student motivation (and reduce cheating) using Mahara
Increase student motivation (and reduce cheating) using MaharaIncrease student motivation (and reduce cheating) using Mahara
Increase student motivation (and reduce cheating) using Mahara
 
Top tips and techniques for getting started (or expanding) your flexible trai...
Top tips and techniques for getting started (or expanding) your flexible trai...Top tips and techniques for getting started (or expanding) your flexible trai...
Top tips and techniques for getting started (or expanding) your flexible trai...
 
Managing and measuring your social media activities using Hootsuite - October...
Managing and measuring your social media activities using Hootsuite - October...Managing and measuring your social media activities using Hootsuite - October...
Managing and measuring your social media activities using Hootsuite - October...
 
Evidencing compliance of quality training and assessment (SNR 15) through e-l...
Evidencing compliance of quality training and assessment (SNR 15) through e-l...Evidencing compliance of quality training and assessment (SNR 15) through e-l...
Evidencing compliance of quality training and assessment (SNR 15) through e-l...
 
Blogging brings you business - but how? - August 2014
Blogging brings you business - but how? - August 2014Blogging brings you business - but how? - August 2014
Blogging brings you business - but how? - August 2014
 
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10 Emerging E-learning Trends, Tools, Techniques supporting 70 20 10
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10
 
Don't let your business become digital road kill - 250614
Don't let your business become digital road kill - 250614Don't let your business become digital road kill - 250614
Don't let your business become digital road kill - 250614
 
Creating and managing a WordPress business website - March 2014
Creating and managing a WordPress business website - March 2014Creating and managing a WordPress business website - March 2014
Creating and managing a WordPress business website - March 2014
 
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214
 
Implementing workplace online training - 130214
Implementing workplace online training - 130214Implementing workplace online training - 130214
Implementing workplace online training - 130214
 
E-portfolios: It’s more than filing stuff in a shoebox - 040214
E-portfolios: It’s more than filing stuff in a shoebox - 040214E-portfolios: It’s more than filing stuff in a shoebox - 040214
E-portfolios: It’s more than filing stuff in a shoebox - 040214
 
Managing Cloud Business Solutions Worksheets v2 Nov 13
Managing Cloud Business Solutions Worksheets v2 Nov 13Managing Cloud Business Solutions Worksheets v2 Nov 13
Managing Cloud Business Solutions Worksheets v2 Nov 13
 
How can iWOT support thin training markets - Converge13 - 211113
How can iWOT support thin training markets - Converge13 - 211113How can iWOT support thin training markets - Converge13 - 211113
How can iWOT support thin training markets - Converge13 - 211113
 
Vvc leading & managing people from anywhere - national telework week - 191113
Vvc   leading & managing people from anywhere - national telework week - 191113Vvc   leading & managing people from anywhere - national telework week - 191113
Vvc leading & managing people from anywhere - national telework week - 191113
 
Creating Learning-Centred Environments - IDEA13 - 121113
Creating Learning-Centred Environments - IDEA13 - 121113Creating Learning-Centred Environments - IDEA13 - 121113
Creating Learning-Centred Environments - IDEA13 - 121113
 

Último

8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 

Último (20)

8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 

Top tips for protecting your business online (updated) Feb 14

  • 1. Modbury & Salisbury Top tips for protecting your business online Allison Miller, Vanguard Visions Consulting
  • 2. You’ll find these slides at: slideshare.net/vanguardvisions
  • 3. Session Overview • Why protect your business online? • Why is now a good time to be doing business online? • Top tips for protecting your business online • Online cyber-smart business assessment • What will you investigate? • Workshop evaluation
  • 5. Why protect your business online? • More business is being done in ‘the Cloud’ • Privacy obligations • Maintain reputation / trust • Protect virtual assets (data) • Multiple users of the one device Image: IC3 and Computer Use and Safety - http://en.wikiversity.org/wiki/IC3/Computer_Use_and_Safety
  • 6. What is the “Cloud”?
  • 7. Cloud Computing aka “the Cloud” Image: http://en.wikipedia.org/wiki/Cloud_computing
  • 8. Types of Cloud Services Image: 'What Type of Cloud?: Private, Public or+Hybrid?' - http://www.flickr.com/photos/26072489@N08/5332731617
  • 9. Some Examples of Public Cloud Services
  • 10. Some Examples of Private Cloud Services
  • 11. A few ways of using the Cloud 1. Software as a Service (SAAS) – – – – Email and Word processing Accounting system Human Resource/Project Management Customer Service Management (CRM) 2. Platform as a service (PaaS) – Operating Systems – Web services – Development Platforms 3. Infrastructure as a service (IaaS) – Data storage – Processing power – Server virtualisation Source: http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031
  • 12. Why use the Cloud? Pros: • • • • • • • • • Anytime, anywhere, any device Quickly ‘scale up’ Stronger security External (backup) storage services Reduced license costs Outsource ICT services Collaboration Synchronisation Greener computing Image: „Open Sky‟ by Vanguard Visions Consulting - http://www.flickr.com/photos/77018488@N03/8496879398
  • 13. Why is now a good time to do business online?
  • 14. Top five industries to fly in 2013-14 in Australia Source: Ibis World (July 2013) – http://www.ibisworld.com.au/media/2013/07/10/52/
  • 15. Internet is a game changer Source: Deloitte Access Economics Pty Ltd (2013) – http://www.deloitte.com/view/en_AU/au/services/financial-advisory/deloitte-accesseconomics/05660fd56ab1e310VgnVCM1000003256f70aRCRD.htm
  • 16. But what are some of the risks on doing more business online?
  • 17. Possible threats to your business General Threats • Hardware and software failure • Malware • Viruses • Spam, scams and phishing • Human error Criminal Threats • Hackers • Fraud • Password theft • Denial of service • Security breaches • Staff dishonesty Natural disasters • Fire • Floods Tips from Queensland Government‟s Business and Industry Portal http://www.business.qld.gov.au/business/starting/business-startup-options/business-online-basics/online-security-fraud
  • 18. Australian Department of Defence, Intelligence and Security, Oct 2013 Source: Strategies to Mitigate Targeted Cyber Intrusions - http://www.asd.gov.au/infosec/top35mitigationstrategies.htm
  • 19. Top tips for protecting your business online
  • 20. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
  • 21. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Hard Disk Drive - http://en.wikipedia.org/wiki/Hard_disk_drive ; Iomega external hard disk drive - http://commons.wikimedia.org/wiki/File:Iomega_external_hard_disk_drive_%28cut%29.JPG
  • 22. Develop a back-up strategy 1. Assess your level of risk and identify actions to minimise 2. What data needs to be backed up and how often 3. Select an appropriate back-up device/location 4. Set reminds to do your back-ups 5. Test that you can use your backed up data 6. Store backed up data away from its original source Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
  • 23. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Master lock with root password - http://commons.wikimedia.org/wiki/File:Master_lock_with_root_password.jpg
  • 24. Importance of Passwords Password length 6 7 8 9 10 11 12 20 Time taken 2 seconds 3 minutes 5.5 hours 3 weeks 5.4 years 515 years 48 millennia 324 billion billion years Source: Stay Smart Online Alert Service 23 Oct 2013 - http://www.staysmartonline.gov.au/alert_service/alerts/how_strong_is_your_password_sso_alert_priority_low
  • 25. Creating strong passwords Your password Strengthening your password Snow-storm 0214-Favourite Red-leather-yellowleather Allison-Miller 5n0w-5t0rm 0214-Fav0ur1te Red-le8ther-Yellow-le8ther 8ll1son-M1ller Source: Stay Smart Online Alert Service 23 Oct 2013 - http://www.staysmartonline.gov.au/alert_service/alerts/how_strong_is_your_password_sso_alert_priority_low
  • 26. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: purple Slog: “Information Security Wordle” http://www.flickr.com/photos/purpleslog/2870445268/
  • 27. Computer/Internet Security Policy 1. Acceptable use 2. Handling sensitive data 3. Securing and handling equipment 4. Using internet safely 5. Remote access 6. Web browser setting Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
  • 28. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Tactical Technology Collective “Title Screen” - http://www.flickr.com/photos/ttc_press/5007644722/
  • 29. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Frederick Hermann - Just like the Nest with a more connected world all the devices need software updates now. Your TV, DVD player, watch, thermostat etc didn't used to ask for constant
  • 30. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
  • 31. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Virtual Private Network - http://en.wikipedia.org/wiki/Virtual_private_network
  • 32. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Imagine: e-commerce - http://commons.wikimedia.org/wiki/File:E-commerce.jpg
  • 33. Create a secure online presence 1. Secure socket layer (SSL) technology 2. Encrypted financial transaction data 3. Update to latest (tested) version 4. Routine back-ups Tips from Queensland Government‟s Business and Industry Portal http://www.business.qld.gov.au/business/starting/business-startup-options/business-online-basics/online-security-fraud
  • 34. staysmartonline.gov.au/alert_service Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
  • 35. Do the cyber-smart business assessment staysmartonline.gov.au/business/home_based_businesses/questionnaire
  • 36. Key points to remember 1. Have good network security 2. Protect your computer and information 3. Protect and use mobile devices safely 4. Transact securely online 5. Back up and protect data. Tips from Queensland Government‟s Business and Industry Portal http://www.business.qld.gov.au/business/starting/business-startup-options/business-online-basics/online-security-fraud
  • 37. What will you investigate further?
  • 39. Want to know more? More info: digitalcapability.com.au Register for eUpdates: bit.ly/digitalcapability Follow on: Twitter - twitter.com/digitalcapabili Facebook - facebook.com/digitalcapability LinkedIn - bit.ly/DCLinkedIN Google+ - bit.ly/DCGoogleplus Pinterest - pinterest.com/vanguardvisions
  • 40. Allison Miller 0400 732 270 allison@vanguardvisions.com.au vanguardvisionsconsulting.com.au vanguardvisionsconsulting.com.au

Notas do Editor

  1. Introduce yourself– Elearningebusiness eportfolio consultancyWork with prominent universities, VET providers and schoolsWorkshops / Webinars for ACPET, Training Development Centre (TDC), QVDC, VELG Training, Wendy Perry & AssociatesiPads /laptopsWifiSurvey at end
  2. Raise your hand if you think protecting your business online is important?Discuss with the group:Ask everyone “Why is protecting your business online important?”
  3. Why protect your business online?:More and more business are doing business online, whether thats selling or paying employees/creditors so the risk of a cyber-attack is on the riseYour business has legal obligations which govern how you must manage your customer’s information to ensure privacyAn online security breach (credit card scam, access to people’s private information) could impact your business’s reputation and/or your relationship with your customers as they will lose trust in your businessYou need to protect your business’s virtual assets the same as you would your tangible assets – that is the data and information being stored on your devices/serversOften in small/home-based businesses computer/devices are share with their family, So it is very important that you make sure you put in place effective security process, and that you and your staff (and your family) are using the internet in a safe and secure way.
  4. Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation.(http://en.wikipedia.org/wiki/Cloud_computing)
  5. There are three types of cloud servicesPublic - services which are accessed over a network that are open for public use.Private – services operated for a single organisation Hybrid - a combine of private and public eg public cloud storage plus an organisation privately ‘rents’ components of the Cloud infrastructure
  6. 1. SaaSThis type of cloud computing delivers software applications through a browser to thousands of customers using a multitenant architecture. This means no upfront investment in servers or software licensing. EgSaaS"desktop" applications include Google Docs and Zoho Office2. Utility computingThisoffers online storage and virtual servers which you can access on demand. Useful for supplemental, non-mission-critical needs, and could replace parts of your computer storage needs. Eg Google Drive or Dropbox3. Platform as a serviceAnother SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider's infrastructure and are delivered to your users via the Internet from the provider's servers. These services are constrained by the vendor's design and capabilities, so you don't get complete freedom, but you do get predictability and pre-integration. 4. Other cloud servicesLike all ‘as a service’ (aaS) services, these other services are based on the concept that the product can be provided on demand to the user regardless of their geographic or organisational separation of provider and theconsumer.Source: http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031http://en.wikipedia.org/wiki/Cloud_computing
  7. Stronger security – latest updates, integrated management (SSO), better backup and recovery
  8. Discuss with the group:“Why is now a good time to doing more business online?”
  9. We are seeing more and more people turning to the web to shop, study and search for information about products and services.Online shopping and internet publishing/broadcasting are among the top five industries predicted to grow by over 10% in the 2013-14 financial year, and beyond.This shows that consumer confidence and access is rising.
  10. The internet is a game changer, with a number of industries significantly changing or being ‘broken’, for example :Music industry being changed by ‘peer to peer’ file sharing which significantly impacted the number of retail musiceBooks means that we are seeing less and less bookstoresMurdoch can’t dump his newspaper shares quick enough as it’s a dying industryPlaces like Harvey Norman, Myer etc are feeling the impact of online shoppingDeloitte Access Economics (NBN Business Readiness Survey) is predicting that:One third of business are significantly being impacted by the internet now, with nearly 5 out of 10 businesses feeling some impact (32% + 17%) on the short fuseWhere does your business sit on this quadrant?What digital disruption are you experiencing?
  11. General IT threatsGeneral threats to IT systems and data include:hardware and software failure - such as power loss or data corruptionmalware - malicious software designed to disrupt computer operationviruses - computer code that can copy itself and spread from one computer to another, often disrupting computer operationsspam, scams and phishing - unsolicited email that seeks to fool people into revealing personal details or buying fraudulent goodshuman error - incorrect data processing, careless data disposal, or accidental opening of infected email attachments.Read more about email scams, viruses, hackers, and other IT threats.Criminal IT threatsSpecific or targeted criminal threats to IT systems and data include:hackers - people who illegally break into computer systemsfraud - using a computer to alter data for illegal benefitpasswords theft - often a target for malicious hackersdenial-of-service - online attacks that prevent website access for authorised userssecurity breaches - includes physical break-ins as well as online intrusionstaff dishonesty - theft of data or sensitive information, such as customer details.Learn more about online crimes against business.Natural disasters and IT systemsNatural disasters such as fire, cyclone and floods also present risks to IT systems, data and infrastructure. Damage to buildings and computer hardware can result in loss or corruption of customer records/transactions.Source: http://www.business.qld.gov.au/business/running/risk-management/information-technology-risk-management/information-technology-risk
  12. At least 85% of the targeted cyber intrusions that the Australian Signals Directorate (ASD, formerly DSD) responds to could be prevented by following the following simple tips for protecting your business online.
  13. Install security software that includes a: firewall - Hardware or software which monitors information going in and out of your computer. anti-virus - A virus is a computer program designed to 'infect' and corrupt a computer and is able to copy itself. The virus can disrupt programs installed on a computeranti-spyware - Software that is installed on a computing device and takes information from it without the consent or knowledge of the user and gives that information to a third party. Set it to scan regularly.Ensure that it is updated automatically. This will help avoid ‘pharming’ – attaching of malicious code on your computer to direct you to a fake website.Pharming[p] is a cyber attack intended to redirect a website's traffic to another, bogus site. Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS serversoftware. DNS servers are computers responsible for resolving Internet names into their real IP addresses. Compromised DNS servers are sometimes referred to as "poisoned". Pharming requires unprotected access to target a computer, such as altering a customer's home computer, rather than a corporate business server.Source: http://en.wikipedia.org/wiki/Pharming What are people using? Payvs Free Security SoftwareSecurity Software is not required on mobile devices (smart phones / tablets) or Apple computers – but you should still be aware of cyber-spamming / hacking on these devices
  14. Develop a backup strategy for your critical data. A good strategy includes daily backups, an additional weekly or monthly backup and offsite storage of at least the weekly back-up media. Test that you can recover with back-up data. Creating a back-up of your data is a sensible and easy way to ensure that in the event of a fire, computer theft or virus infection you can recover all of your business information from your computer or website quickly and easily.The financial cost and time that it takes to create and implement a back up strategy is likely to be only a fraction of what you will spend if you need to recover from a data loss without one.Think of a backup strategy as insurance for your dataMake regular backups of critical data and programs on your computer. Store the backup disks in secure offsite storage. Make sure you avoid needing to recover data by having good security practices in the first place. Install and use security software including a firewall and anti-virus and anti-spyware software. Read more about securing you computer. Use a strong password to secure your back-up. This will make it much more difficult, if not impossible, for someone to view it or misuse it.
  15. Develop a back-up strategyDevelop a disaster recovery plan. Start by assessing your level of risk and identifying what actions you can take to minimise the risk. Assess what data and programs on your computer need to be backed up and how often. You may either back up all the data and certain programs on your hard drive each time you back up or you may do incremental back-ups. Incremental back-ups only include the files that have changed since the last time therefore saving time and space. Select a back-up device that is large enough to store the files and fast enough so it is not too time-consuming. Examples include CDs, DVDs, memory sticks or an external hard drive. Make a note somewhere obvious, such as in an office diary, reminding you to do the back-up. Test the data that has been backed up successfully and that your process is working properly. Store the back-up copies in a safe location away from your computer systems i.e. away from your home or business premises. Remember putting this information on portable media makes it vulnerable to physical removal so secure it.Discuss with the person next to you whether you are already doing this or what you would need to do to make this work for your business?
  16. If you do not have a dedicated IT Manager, assign someone person in your organisation to have responsibility for computer security egpassword, backups, AV updates, and minimise the number of users with administrative privileges.
  17. Strong Passwords:Generally, a strong password has the following attributes:• a minimum length of eight (8) characters; and• a mix of upper and lower case letters; and• at least one numeral; and• at least one non-alphanumeric character; and• does not include a dictionary word in any language.The two main ways criminals defeat strong passwords is by:• using malicious software on your computer that monitors your computer to find your password, by looking in the place where passwords are stored, monitoring your key strokes or screen activity; and• tricking people into disclosing their important passwords, or other sensitive information of value to a criminal – this is called phishing. Ensuring you use a strong password is an important part of staying safe online.Weak passwords can be cracked extremely quickly by computers used by attackers to automatically guess passwords—systematically attempting one password after another.For example, in the US, a computer has been recently built that is capable of guessing any eight character Windows password in just six hours. This system targets older Windows based logons, but has set a new benchmark for the speed at which passwords can be systematically guessed. On average, this computer is capable of making 350 billion password guesses per second—which means it can theoretically attempt every word in the English Dictionary (and more) in an instant.Newer versions of Windows have better encryption and so are significantly more resistant to this attack; however, the sheer speed at which this machine is capable of testing passwords highlights the importance of choosing strong passwords for our everyday purposes. This computer was not expensive to build.Passwords that use common words and numbers, such as your dog’s name or your birthday are far too easy for cyber criminals to guess by setting up such a system—even using an ordinary computer.Cyber criminals attempting ‘brute force’ attacks, as they are described, also often employ vast lists of commonly used passwords, and entire dictionary lists of likely words, as the first combinations they will try.When websites get hacked, any revealed passwords are also often added to lists of commonly used passwords. This means that the most likely passwords any of us use—and variations of them—get tried first of all, dramatically reducing the number of guesses and time attackers require.In many cases this entire process can be done without the knowledge of the victim or website involved. An attacker will take a copy of the list of encrypted passwords from a computer or website, and then with simple software to automate the guessing process, they wait for as many passwords to be cracked as possible.Weaker passwords will tend to crack sooner, while stronger passwords require far more time and more computing effort than is feasible. Password strengthThis is why password strength is a key factor affecting your online security. You want to be sure your password, at a minimum, is not one of the more easily guessed combinations out there.‘Strength’, refers to the overall length of the password as well as the possible character combination you choose: numbers, symbols and upper or lower case letters.A weaker password is shorter and contains a less randomised mixture of all of these.Dates, names, teams, anniversaries, pets and places are frequently used by people for passwords, and so they are also the options attempted first by attackers.‘Password’ is still unfortunately the most commonly used password.A stronger password is a longer and more random mixture of characters.The computer mentioned in this example can crack any eight character (Windows) password in around six hours, while a nine character password would require three weeks, and a ten character password, more than five years.Setting a strong passwordIncreasing the length of your password exponentially increases the time it takes to guess it, so it is wise to choose a longer one.Your passwords should not comprise words, but a random mixture of upper and lower case characters, number and symbols.Stay Smart Online has lots of useful advice about setting strong passwords that you can also remember!This table is an indication of the time taken for the system in this example to guess a password based on the number of characters (assuming a random password chosen from 95 different characters: uppercase, lowercase, numbers, symbols).Source: Stay Smart Online Alert Service 23 Oct 2013 - http://www.staysmartonline.gov.au/alert_service/alerts/how_strong_is_your_password_sso_alert_priority_low
  18. Strong Passwords:Generally, a strong password has the following attributes:• a minimum length of eight (8) characters; and• a mix of upper and lower case letters; and• at least one numeral; and• at least one non-alphanumeric character; and• does not include a dictionary word in any language.The two main ways criminals defeat strong passwords is by:• using malicious software on your computer that monitors your computer to find your password, by looking in the place where passwords are stored, monitoring your key strokes or screen activity; and• tricking people into disclosing their important passwords, or other sensitive information of value to a criminal – this is called phishing. Write down some possible passwordsHave a bank of themEnsuring you use a strong password is an important part of staying safe online.Weak passwords can be cracked extremely quickly by computers used by attackers to automatically guess passwords—systematically attempting one password after another.For example, in the US, a computer has been recently built that is capable of guessing any eight character Windows password in just six hours. This system targets older Windows based logons, but has set a new benchmark for the speed at which passwords can be systematically guessed. On average, this computer is capable of making 350 billion password guesses per second—which means it can theoretically attempt every word in the English Dictionary (and more) in an instant.Newer versions of Windows have better encryption and so are significantly more resistant to this attack; however, the sheer speed at which this machine is capable of testing passwords highlights the importance of choosing strong passwords for our everyday purposes. This computer was not expensive to build.Passwords that use common words and numbers, such as your dog’s name or your birthday are far too easy for cyber criminals to guess by setting up such a system—even using an ordinary computer.Cyber criminals attempting ‘brute force’ attacks, as they are described, also often employ vast lists of commonly used passwords, and entire dictionary lists of likely words, as the first combinations they will try.When websites get hacked, any revealed passwords are also often added to lists of commonly used passwords. This means that the most likely passwords any of us use—and variations of them—get tried first of all, dramatically reducing the number of guesses and time attackers require.In many cases this entire process can be done without the knowledge of the victim or website involved. An attacker will take a copy of the list of encrypted passwords from a computer or website, and then with simple software to automate the guessing process, they wait for as many passwords to be cracked as possible.Weaker passwords will tend to crack sooner, while stronger passwords require far more time and more computing effort than is feasible. Password strengthThis is why password strength is a key factor affecting your online security. You want to be sure your password, at a minimum, is not one of the more easily guessed combinations out there.‘Strength’, refers to the overall length of the password as well as the possible character combination you choose: numbers, symbols and upper or lower case letters.A weaker password is shorter and contains a less randomised mixture of all of these.Dates, names, teams, anniversaries, pets and places are frequently used by people for passwords, and so they are also the options attempted first by attackers.‘Password’ is still unfortunately the most commonly used password.A stronger password is a longer and more random mixture of characters.The computer mentioned in this example can crack any eight character (Windows) password in around six hours, while a nine character password would require three weeks, and a ten character password, more than five years.Setting a strong passwordIncreasing the length of your password exponentially increases the time it takes to guess it, so it is wise to choose a longer one.Your passwords should not comprise words, but a random mixture of upper and lower case characters, number and symbols.Stay Smart Online has lots of useful advice about setting strong passwords that you can also remember!This table is an indication of the time taken for the system in this example to guess a password based on the number of characters (assuming a random password chosen from 95 different characters: uppercase, lowercase, numbers, symbols).Source: Stay Smart Online Alert Service 23 Oct 2013 - http://www.staysmartonline.gov.au/alert_service/alerts/how_strong_is_your_password_sso_alert_priority_low
  19. Develop clear policies for staff using your computer or network. Ensure that staff understand how they are allowed to use email and the internet. A computer security policy is a document that covers the rules and practices that you want your staff to follow when working with e-mail, browsing the Web, and accessing confidential data stored in your system. A security policy can help your organisation reduce security breaches and data loss by helping employees follow through with safe and secure computing practices.In some cases you may find your customers and/or suppliers demand that you have a security policy in place that they can review - especially if you may be formally linking into their IT systems
  20. A security policy may cover:Acceptable use - how staff use email and the internet. Should certain websites be blocked to staff? Should there be a restriction on the size of email attachments? Handling sensitive data - who and how should sensitive data be handled and stored. Securing and handling equipment - is there a system in place to track who is using equipment in the organisation? Using internet safely - what system is in place to ensure anti-virus, anti-spyware, operating systems, Web browsers and other software are kept up to date? Remote access - what is the system to ensure security is maintained while accessing the work from the road or at home?Web browser setting – increase the security levels in your web browser, stop/switch off cookies.
  21. Develop a 'culture of security'. Businesses need to have Internet security measures in place and make sure staff are aware of and follow internet security practices. When creating your security policy, identify and work on securing the IT assets that impact your business the most. – What are your IT assets?Implement a process of reporting breaches. If staff are able to report breaches confidentially they may be more willing to report at all. Set clear policies on what websites employees can and can not access.  Staff need to know what is expected of them when using email and the internet at work. Keep your security policy up to date. Review the security policy yearly to ensure it is still relevant. Stay up to date on cyber security issues. Subscribe to the Stay Smart Online Alert service to keep up to date on the latest security and network vulnerabilities. Develop clear rules for staff so that they understand what they need to be aware of and their responsibilities. You should also have clear policies on personal use and what is, or isn't, allowed. Provide induction training for new employees. It is a good time to introduce staff to your security polices and practices. Keep staff up-to-dateDescribe the ‘culture of security’ within your business
  22. Use software from reputable sources. Keep your software patches up-to-date,ie a fix for a software program, also known as a software updateIt is possible that flaws within software (called vulnerabilities) can allow hackers to remotely access and take control of your computer.These vulnerabilities exist in the operating system (Windows, Linux, Mac OS etc) and the applications that are installed on your computer (browsers, media players, word processing etc).When software providers become aware of vulnerabilities in their products, they often issue an update to the software to fix the problem. These updates are also known as patches. Similar to the way fabric patches are used to repair holes in clothing, software patches repair holes in software.Most of the software that you have installed on your computer can be updated automatically if the computer is connected to the internet.Update your web browser to the latest version. Web browsers are regularly updated to fix security flaws, so it is important to update your web browser to the latest version.Install your smartphone updates
  23. Use spam filters to reduce the amount of spam that your business receives.Know how to manage the spam that gets through and ensure your staff know how to recognise scam and hoax emails and to avoid clicking on links or opening attachments from suspicious emails. Email viruses, worms and Trojans are capable of harming your business computer system and with it your ability to conduct your business.Email is one of the easiest and fastest means of business communication. As with any form of communication that is cheap and easy it is open to abuse. Spam-the electronic equivalent of 'junk mail'-now makes up the majority of email traffic. Spam includes electronic mail as well as mobile phone messaging such as SMS and MMS.Because businesses often advertise their email addresses they are likely to receive greater volumes of spam than home users. This not only has an impact on productivity, but spam can also carry viruses, worms and Trojans through malicious code in attachments and commands embedded in seemingly normal messages.If you use email to conduct your business you need to know how to reduce the spam you receive and to securely manage what does reach your inbox. You also need to be aware of your legal obligations to ensure any electronic messages you send to consumers do not breach Spam Act or the Australian E-marketing code of practiceDo not to open email attachments or click on hyperlinks in emails from unknown or questionable sources. It is not enough that the email originated from an address you recognise. Don't ever reply to spam. This is likely to compound the problem by confirming your email address to the spammers. Report spam to the Australian Communications and Media Authority (ACMA) at www.spam.acma.gov.au or phone 1300 855 180. Spam SMS can be reported to 0429 999 888Watch out for spam / viruses via inboxes/direct messages in social media spaces too.
  24. Being able to access the office while on the road can provide increased productivity and flexibility. However, it is important to ensure your equipment and connection is secure so that your network is not vulnerable or your sensitive business information exposed.Remote access can create a number of security risks for your otherwise secure network. When you open up your network to connections from an external source you increase the risk that this connection can be used by a third party to access your network or that business information can be intercepted. You need to ensure that you secure access so that only legitimate users can access your network and that you encrypt data to prevent theft. Securing remote access requires a degree of technical knowledge. If remote access is an important part of your business, and you transmit sensitive business information, it may be worthwhile to invest in specialist advice from a computer expert.Seek expert advice. Securing your remote access requires a degree of technical knowledge so seek expert advice from a computer professional if needed. Install up-to-date security software (firewall, antivirus and anti-spyware) on remote devices. Ensure that your network is also secure and security software is also up-to-date. Make sure that staff using laptops do not set their computer to log-in automatically. Make sure that they don't store their password on their laptop. Delete staff remote access privileges once they are not needed. For example, don't let someone who has left the company retain access to your network.
  25. Selling online can be great for your business as it expands your potential customer base to all those connected to the internet. But it also can expose your business to fraudsters, cyber vandals and criminals.Fraudulent purchases can result in lost revenue and reputation and dealing with credit card chargebacks can be time consuming and make it difficult to assess your current financial position. Having an online shop can expose your systems to unauthorised access and theft of customer information such as credit card details. Vandals and criminals can also attempt to disrupt your business through denial of services attacks, typically to extort money.To take full advantage of the digital economy you need to put in place some simple security measures so your business and your customers are protected.Keep a look out for suspect online orders. Taking steps to verify a buyer is genuine when you receive an order will save you the potential hassle of a credit card charge back later, and may prevent fraud. Secure your e-commerce website. Use the latest version of your e-commerce software and make sure your server is secure (see secure your computers and servers). Use strong passwords and change them regularly. Particularly in securing customer financial data. Don't store private customer data and credit card details on a public e-commerce server.  Store these details offline Regularly monitor and test your e-commerce systems. Conduct penetration tests of your systems and audit your security practices to ensure best practice.
  26. Create a secure online presenceIf your business has an online presence, you should also assess the security of your website, email accounts, online banking accounts and social media profiles.For example, secure socket layer (SSL) technology is used to encrypt transaction data and to send customer and card details to the acquiring bank for authorisation. You should ensure any web hosting solution you consider is capable of supporting the SSL protocol.
  27. Keep yourself informed about the latest cyber security risks. Subscribe to email notification services that keep you informed about the latest cyber security risks and solutions. See our Alert Service.Get people to subscribe
  28. What did you find out about your business?http://www.staysmartonline.gov.au/business/home_based_businesses/questionnaire
  29. What will you investigate further and why?
  30. Ask participants to complete the online workshop evaluation